Enterprise employers and security specialists are increasingly growing concerned about what some see as a deepening skills shortage in the information technology...Network World From ACM TechNews | September 4, 2012
Researchers at the University of Georgia and the Georgia Institute of Technology have developed Pleiades, a prototype system that can better detect Domain Name...Network World From ACM TechNews | August 14, 2012
The Software Assurance Forum for Excellence in Code recently issued "Practical Security Stories and Security Tasks for Agile Development Environments," a white...Network World From ACM TechNews | July 19, 2012
The U.S. Defense Advanced Research Projects Agency recently launched the Quiness program, which aims to demonstrate that quantum communications can generate secure...Network World From ACM TechNews | May 22, 2012
Open source code libraries have a significant number of security vulnerabilities, according to an Aspect Security study that analyzed 113 million software downloads...Network World From ACM TechNews | March 29, 2012
The Internet Engineering Task Force is considering approving the Simple Cloud Identity Management scheme, which manages user identity in cloud-based applications...Network World From ACM TechNews | March 15, 2012
DARPA will launch the Zero Robotics Autonomous Space Capture Challenge on March 28, a contest that asks participants to develop unique algorithms to control small...Network World From ACM TechNews | March 12, 2012
MIT researchers are studying how to build a cloud computing infrastructure that recognizes and eliminates a cyberattack under normal operating procedures. Network World From ACM TechNews | February 29, 2012
Data routinely gathered in Web logs, such as IP address, cookies, operating systems, browser type, and user-agent strings can threaten online privacy because they...Network World From ACM TechNews | February 6, 2012
U.S. Defense Advanced Research Projects Agency researchers are developing security technologies that go beyond recognizing complex passwords. Network World From ACM TechNews | January 25, 2012
Password use needs an overhaul that is driven by understanding the damage that can be done when password security is compromised, and researchers need to quantify...Network World From ACM TechNews | January 6, 2012
Password less authentication is an experimental two-factor authentication method designed to ensure the security of online transactions made via cell phones.Network World From ACM TechNews | December 9, 2011
What is Duqu? Duqu (pronounced dyu kyu) is primarily a remote-access Trojan targeted at a limited number of organizations in Europe, Africa, and the Middle East...Network World From ACM News | October 21, 2011
University of Wisconsin, Madison researchers have developed Airshark, software that enables wireless access points to automatically detect radio-frequency interference...Network World From ACM TechNews | September 26, 2011
Law enforcement may be interested to see if anyone actually shows up to this year to accept the annual Pwnie Award for Epic Ownage at Black Hat, since all the nominees...Network World From ACM News | July 26, 2011
Microsoft researchers are studying how to differentiate spammer email accounts from legitimate users' accounts, and have found that attacker accounts do not have...Network World From ACM TechNews | July 5, 2011
A security researcher who says he's found serious problems with Siemens computers used in power plants and heavy industry is now expecting to go public with his...Network World From ACM News | June 8, 2011
Although ambitious, the White House's recently issued International Strategy for Cyberspace could be difficult to deploy as some of its objectives conflict and...Network World From ACM TechNews | May 25, 2011
The Accredited Standards Committee X9 has approved NTRUEncrypt, a public-key algorithm that is considered to be faster than both elliptic-curve cryptography and...Network World From ACM TechNews | April 21, 2011
Does the RSA SecurID two-token authentication system include a back door that was built in at the request of the U.S. government in exchange for letting RSA export...Network World From ACM News | March 24, 2011